Multiple stack-based buffer overflows in fsplib.c in fsplib before 0.9 might allow remote attackers to execute arbitrary code via (1) a long filename that is not properly handled by the fsp_readdir_native function when MAXNAMLEN is greater than 255, or (2) a long d_name directory (dirent) field in the fsp_readdir function. gFTP contains local copy of fsplib source code to support FSP protocol.
fsplib upstream patches: http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.17&r2=1.18 http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.21&r2=1.22 http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.h?r1=1.12&r2=1.13 gFTP patch: http://svn.gnome.org/viewcvs/gftp/trunk/lib/fsplib/fsplib.c?r1=747&r2=768
Both issue only affect platforms with MAXNAMLEN > 255, i.e. not Linux. Setting low priority and severity.
Not vulnerable. fsplib is part of gftp in Red Hat Enterprise Linux 5, but this issue does not affect Linux.